Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1148832 - (CVE-2014-7142) CVE-2014-7142 squid: pinger incorrect input validation flaw in handling of ICMP replies (SQUID-2014:4)
CVE-2014-7142 squid: pinger incorrect input validation flaw in handling of IC...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20140916,reported=2...
: Security
Depends On:
Blocks: 1139719
  Show dependency treegraph
 
Reported: 2014-10-02 09:28 EDT by Vincent Danen
Modified: 2015-07-31 03:27 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-10-02 09:30:04 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2014-10-02 09:28:51 EDT
Another flaw was reported in the Squid pinger program due to incorrect input validation.  This could be used to cause a Denial of Service or information leak when the pinger program processes ICMP or ICMPv6 packets.

While this problem exists in the source code of squid packages as shipped with Red Hat Enterprise Linux 6 and 7, as well as current Fedora releases, the program itself is not built.


Statement:

This issue did not affect the versions of squid as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they do not provide the vulnerable program "pinger".


External References:

http://www.squid-cache.org/Advisories/SQUID-2014_4.txt
Comment 1 Tomas Hoger 2014-10-06 17:24:31 EDT
Upstream commit:

http://bazaar.launchpad.net/~squid/squid/trunk/revision/13583

The above commit fixes both CVE-2014-7141 and CVE-2014-7142.

The CVE-2014-7142 issue is an integer underflow when computing size of the ICMP reply data.  This leads to an attempt to copy large amount of data, which should trigger pinger process crash.  Unlike CVE-2014-7141, this issue only existed in ICMP(v4) handling, the ICMPv6 previously had similar check.

Note You need to log in before you can comment on or make changes to this bug.